WIRELESS sensor networks (WSNs) have attracted a. Homology-based Distributed Coverage Hole Detection in Wireless Sensor Networks

Size: px
Start display at page:

Download "WIRELESS sensor networks (WSNs) have attracted a. Homology-based Distributed Coverage Hole Detection in Wireless Sensor Networks"

Transcription

1 IEEE/ACM TRANSACTIONS ON NETWORKING 1 Homology-based Distributed Coverage Hole Detection in Wireless Sensor Networks Feng Yan, Member, IEEE, Anaïs Vergne, Philippe Martins, Senior Member, IEEE, Laurent Decreusefond arxiv: v2 [cs.ni] 1 Jul 214 Abstract Homology theory provides new and powerful solutions to address the coverage problems in wireless sensor networks (WSNs). They are based on algebraic objects, such as Čech complex and Rips complex. Čech complex gives accurate information about coverage quality but requires a precise knowledge of the relative locations of nodes. This assumption is rather strong and hard to implement in practical deployments. Rips complex provides an approximation of Čech complex. It is easier to build and does not require any knowledge of nodes location. This simplicity is at the expense of accuracy. Rips complex can not always detect all coverage holes. It is then necessary to evaluate its accuracy. This work proposes to use the proportion of the area of undiscovered coverage holes as performance criteria. Investigations show that it depends on the ratio between communication and sensing radii of a sensor. Closed-form expressions for lower and upper bounds of the accuracy are also derived. For those coverage holes which can be discovered by Rips complex, a homology-based distributed algorithm is proposed to detect them. Simulation results are consistent with the proposed analytical lower bound, with a maximum difference of.5%. Upper bound performance depends on the ratio of communication and sensing radii. Simulations also show that the algorithm can localize about 99% coverage holes in about 99% cases. Index Terms Wireless sensor networks, coverage hole, homology. I. INTRODUCTION WIRELESS sensor networks (WSNs) have attracted a great deal of research attention due to their wide potential applications such as battlefield surveillance, environmental monitoring and intrusion detection. Many of these applications require a reliable detection of specified events. Such requirement can be guaranteed only if the target field monitored by a WSN contains no coverage holes, that is to say regions of the domain not monitored by any sensor. Coverage holes can be formed for many reasons, such as random deployment, energy depletion or destruction of sensors. Consequently, it is essential to detect and localize coverage holes in order to ensure the full operability of a WSN. There is already an extensive literature about the coverage problems in WSNs. Several approaches are based on computational geometry with tools such as Voronoi diagram F. Yan was with the Network and Computer Science Department, TELE- COM ParisTech, Paris, France. He is currently with the Networks, Security and Multimedia Department, TELECOM Bretagne, Rennes, France ( feng.yan@telecom-bretagne.eu). A. Vergne is with the Geometrica team, Inria Saclay - Ile de France, Palaiseau, France ( anais.vergne@inria.fr) P. Martins and L. Decreusefond are with the Network and Computer Science Department, TELECOM ParisTech, Paris, France ( martins@telecomparistech.fr, decreuse@telecom-paristech.fr.) A part of this paper has been published in IEEE ICC 212. and Delaunay triangulations, to discover coverage holes [1] [3]. These methods require precise information about sensor locations. This substantially limits their applicability since acquiring accurate location information is either expensive or impractical in many settings. Some other approaches attempt to discover coverage holes by using only relative distances between neighbouring sensors [4] [6]. Similarly, obtaining precise range between neighbouring nodes is costly. More recently, homology is utilized in [7] [9] to address the coverage problems in WSNs. Ghrist and his collaborators introduced a combinatorial object, Čech complex, which fully characterizes coverage properties of a WSN (existence and locations of holes). Unfortunately, this object is very difficult to construct even if the precise location information of sensors is provided. Thus, they introduced a more easily computable complex, Rips complex. This complex is constructed with the sole knowledge of the connectivity graph of the network and gives an approximate coverage by simple algebraic calculations. As regards implementation in real WSN, these homology based methods are necessarily centralized, which makes them impractical in large scale sensor networks. Some algorithms have been proposed to implement the above mentioned ideas in a distributed context, see [1], [11]. But there are two disadvantages of these algorithms. On one hand, these homology based algorithms are all dependent on the assumption that the communication radius of a sensor is smaller than 3 times the sensing radius of the sensor. When such assumption is not satisfied, it is possible that Rips complex may miss some special coverage holes (defined as triangular holes in Section III). In order to assess the accuracy of Rips complex based coverage hole detection, it is thus of paramount importance to determine the proportion of the area of missed coverage holes. To the best of our knowledge, we are the first to investigate this problem. On the other hand, these algorithms try to verify coverage or detect coverage holes by homology computation, which is generally of high complexity especially for large scale networks. So it is necessary to design an efficient algorithm to detect coverage holes. The main contributions of our paper are as follows. First, we present the relationships between Čech complex and Rips complex in terms of coverage hole under different ratios between communication and sensing radii of a sensor. We find that when the communication radius is at least two times sensing radius, if there is a hole in Rips complex, there must be a hole in Čech complex. A hole in a Čech complex missed by a Rips complex must be bounded by a triangle. Based on that, a formal definition of triangular and non-triangular hole is presented.

2 2 IEEE/ACM TRANSACTIONS ON NETWORKING Second, for triangular holes, we derive the closed-form expressions for lower and upper bounds of the proportion of their area under a homogeneous setting. Such proportion is related to the ratio between communication and sensing radii of each sensor and three different ratios between communication and sensing radii are investigated. Third, for non-triangular holes, an efficient homology based distributed algorithm is proposed to detect them. In the algorithm, the Rips complex is first constructed for a given WSN. Then some vertices and edges are deleted without changing the number of holes in the original Rips complex. After that, the edges lying on the boundary of holes will be detected. Then coarse boundary cycles can be discovered. Finally all boundaries of the non-triangular holes are found by minimizing the length of coarse boundary cycles. The remainder of the paper is organized as follows. Section II presents the related work. In Section III, the network model and the formal definition of triangular and non-triangular hole are given. Upper and lower bounds on the proportion of the area of triangular holes under different ratios between communication and sensing radii are computed in Section IV. Section V describes the homology based distributed algorithm for non-triangular holes detection. In Section VI, performance evaluation of the bounds and the algorithm is given. Finally, Section VII concludes the paper. II. RELATED WORK Since this paper aims to evaluate the ratio of the area of coverage holes missed by homology based approaches and to design coverage hole detection algorithms, we present the related work in two aspects: analytical coverage ratio evaluation and coverage hole detection approaches. A. Analytical coverage ratio evaluation Extensive research has been done to analyze coverage ratio of a WSN. In [12], the authors studied the coverage properties of large-scale sensor networks and obtained the fraction of the area covered by sensors. The sensors are assumed to have the same sensing range and are distributed according to a homogeneous Poisson point process (PPP) in plane. In [13], the authors studied how the probability of k-coverage changes with the sensing radius or the number of sensors, given that sensors are deployed as either a PPP or a uniform point process. In [14], the coverage problem in planar heterogeneous sensor networks are investigated and analytical expressions of coverage are derived. Their formulation is more general in the sense that sensor can be deployed according to an arbitrary stochastic distribution, or can have different sensing capabilities or can have arbitrary sensing shapes. In [15], a point in a plane is defined to be tri-covered if it lies inside a triangle formed by three nodes, and the probability of tricoverage is analyzed. None of them considered triangular holes, we provided some initial results about the ratio of the area of triangular holes in [16] and further improve them in this paper. B. Coverage hole detection approaches Coverage hole detection approaches can be generally classified into three categories: location-based, range-based and connectivity-based. Location-based approaches are usually based on computational geometry with tools such as Voronoi diagram and Delaunay triangulations, to discover coverage holes [1] [3]. Range-based approaches attempt to discover coverage holes by using only relative distances between neighbouring sensors [5], [6]. These two types of approaches need either precise location information or accurate distance information, which restricts their applications since such information is not easy to obtain in many settings. In connectivity-based approaches, homology-based schemes attract particular attention due to its powerfulness for coverage hole detection. As a pioneer work, in [9], Ghrist and his collaborators introduced homology to detect coverage holes. They first introduced a combinatorial object, Čech complex, which can capture all coverage holes. Unfortunately, this object is very difficult to construct even if the precise location information of sensors is provided. Thus, they introduced another more easily computable complex, Rips complex. This complex can be constructed with the sole knowledge of the connectivity graph of the network and gives an approximate coverage by simple algebraic calculations. Then their work is followed by [7], [8], [17], [18], where a relative homological criterion for coverage is presented. But these homology based approaches are centralized. The first steps of implementing the above ideas in a distributed way were taken in [1]. It is shown that combinatorial Laplacians are the right tools for distributed computation of homology groups, and thus can be used for decentralized coverage verification. The combinatorial Laplacians can be used to detect absence of holes or a single hole. But when there are multiple holes close to each other in WSNs, it is not clear how to distinguish them. To address such limitations, a gossip like decentralized algorithm was proposed in [19] to compute homology groups, but its convergence is slow as stated in [19]. In [11], the authors first presented a decentralized scheme based on combinatorial Laplacians to verify whether there is a coverage hole or not in a WSN. For the case when there are coverage holes, they further formulated the problem of localizing coverage holes as an optimization problem for computing a sparse generator of the first homology group of the Rips complex corresponding to the sensor network. But it is possible that some cycle found by their algorithm contains multiple holes next to each other. More recently, for the purpose of coverage verification, a novel distributed algorithm for homology computation was proposed in [2] based on reduction and co-reduction of simplicial complex. For the case when there are more than one holes, the authors proposed to first find the homology generator of the reduced complex and then use their algorithm to localize holes. The algorithm is quite original but with high complexity since it requires to construct all the simplices. All these homology based algorithms try to verify coverage or detect coverage holes by computing homology either in a centralized or distributed way, but computing homology is

3 YAN et al.: HOMOLOGY-BASED DISTRIBUTED COVERAGE HOLE DETECTION IN WIRELESS SENSOR NETWORKS 3 generally of high complexity especially for large scale sensor networks. Our algorithm does not try to compute homology to localize holes, it simplifies the Rips complex of a WSN by deleting some vertices and edges without changing homology and makes the Rips complex nearly planar. Then it can be efficient to detect coverage holes. III. MODELS AND DEFINITIONS Consider a collection of stationary sensors (also called nodes) deployed randomly in a planar target field. As usual, isotropic radio propagation is assumed. Each sensor monitors a region within a circle of radius R s and may communicate with other sensors within a circle of radius. Note that this assumption is mainly for analyzing the proportion of the area of triangular holes, it is not necessary for the algorithm proposed in Section V. In addition, some other assumptions are as follows. 1) There are sensors located on the external boundary of the target field. They are known as fence sensors and other sensors are referred to as internal sensors. Each fence sensor has two fence neighbours. This is also the general assumption in many homology based algorithms [7] [9], [11]. 2) Although sensors are not aware of their locations, every sensor can know whether it is a fence or an internal node by using the mechanisms presented in [5] or other methods as in [21]. In fact, it is a conventional assumption adopted by many existing range-based methods [5], [22] or connectivity methods [11], [21]. 3) Internal sensors are distributed in the planar target field according to a homogeneous PPP with intensity λ. 4) Each sensor has a unique ID. 5) The network has only one connected component. Before defining Čech complex and Rips complex, it is necessary to give a brief introduction to the tools used in the paper. For further readings, see [23] [25]. Given a set of points V, a k-simplex is an unordered set [v, v 1,..., v k ] V where v i v j for all i j. So a -simplex is a vertex, a 1-simplex is an edge and a 2-simplex is a triangle with its interior included, see Fig. 1. The faces of this k-simplex consist of all (k-1)- simplex of the form [v,..., v i 1, v i+1,..., v k ] for i k. An abstract simplicial complex is a collection of simplices which is closed with respect to inclusion of faces. v v v 1 -simplex Fig. 1. -, 1- and 2-simplex 1-simplex v v 1 v 2 2-simplex Let V denote the set of sensor locations in a WSN and S = {s v, v V} denote the collection of sensing ranges of these sensors. For a location v, s v = {x R 2 : x v R s }. Then Čech complex and Rips complex can be defined as follows [7], [8]. Definition 1 (Čech complex). Given a finite collection of sensing ranges {s v, v V}, the Čech complex of the collection, Č(V), is the abstract simplicial complex whose k- simplices correspond to non-empty intersections of k + 1 distinct elements of {s v, v V}. Definition 2 (Rips complex). Given a finite set of points V in R n and a fixed radius ɛ, the Rips complex of V, R ɛ (V), is the abstract simplicial complex whose k-simplices correspond to unordered (k + 1)-tuples of points in V which are pairwise within Euclidean distance ɛ of each other. According to the definition, the Čech complex and Rips complex of the WSN, respectively denoted by ČR s (V) and R Rc (V), can be constructed as follows: a k-simplex [v, v 1,, v k ] belongs to ČR s (V) whenever k l= s v l and a k-simplex [v, v 1,, v k ] belongs to R Rc (V) whenever v l v m for all l < m k. Fig. 2 shows a WSN, its Čech complex and two Rips complexes for two different values of. Depending on the ratio over R s, the Rips complex and the Čech complex may be close or rather different. In this example, for = 2R s, the Rips complex sees the hole surrounded by 2, 3, 5, 6 as in the Čech complex whereas it is missed in the Rips complex for = 2.5R s. At the same time, the true coverage hole surrounded by 1, 2, 6 is missed in both Rips complexes. R s (a) 6 (c) (b) 6 (d) Fig. 2. (a) a WSN, (b) Čech complex, (c) Rips Complex under Rc = 2Rs, (d) Rips Complex under = 2.5R s In fact, as proved in [7], any coverage hole can be found in Čech complex. Unfortunately, the construction of Čech complex is of very high complexity even if the precise location information of nodes is provided. So a more easily computable tool, Rips complex, is used. But Rips complex can not always capture all coverage holes. To be more specific, there exist following relations between Čech complex and Rips complex: R Rc (V) ČR s (V) R 2Rs (V), if 3R s. (1) According to (1), some relationships between Čech complex and Rips complex in terms of coverage hole can be derived as illustrated in the following corollaries. For convenience, define γ = /R s. Corollary 1. When γ 3, if there is no hole in Rips complex R Rc (V), there must be no hole in Čech complex Č Rs (V). Corollary 2. When γ 2, if there is a hole in Rips complex R Rc (V), there must be a hole in Čech complex Č Rs (V)

4 4 IEEE/ACM TRANSACTIONS ON NETWORKING Corollary 3. When 3 < γ < 2, there is no guarantee relation between Rips complex R Rc (V) and Čech complex Č Rs (V) in terms of holes. Please refer to [26] for the proof. From the discussion above, a hole in a Čech complex not seen in a Rips complex must be bounded by a triangle. Based on this observation, a formal definition of triangular hole and non-triangular hole is given as follows. Definition 3 (Triangular and non-triangular hole). For a pair of complexes Č Rs (V) and R Rc (V), a triangular hole is an uncovered region bounded by a triangle formed by three nodes v, v 1, v 2, where v, v 1, v 2 can form a 2-simplex which appears in R Rc (V) but not in Č Rs (V). Other holes are non-triangular. For triangular holes, it is impossible to detect them with only connectivity information, so we want to analyze the proportion of the area of such holes in a target field. For nontriangular holes, we aim to design a distributed algorithm to discover the boundaries of these holes. IV. BOUNDS ON PROPORTION OF THE AREA OF TRIANGULAR HOLES For triangular holes, we aim to derive the proportion of their area. In this section, the conditions under which any point in the target field is inside a triangular hole are first given. In Section III, it is found that the proportion of the area of triangular holes is related to the ratio γ. Three different cases are considered for the proportion computation. For each case, the upper and lower bounds of the proportion are derived. A. Preliminary Lemma 1. For any point in the target field, it is inside a triangular hole if and only if the following two conditions are satisfied: 1) the distance between the point and its closest node is larger than R s. 2) the point is inside a triangle: the convex hull of three nodes with pairwise distance less than or equal to. Fig. 3 gives an example to show a triangular hole. The blanket region inside the triangle is a triangular hole since it is not covered by any node and is bounded by a triangle. R s Fig. 3. An example of a triangular hole. Lemma 2. If there exists a point O which is inside a triangular hole, then R s < / 3. Lemma 3. Let O be a point inside a triangular hole and l denote the distance between O and its closest neighbour, then R s < l / 3. Please refer to [16] for the proof. A PPP whose intensity is proportional to the Lebesgue measure is stationary in the sense that any translation of its atoms by a fixed vector does not change its law. Thus without considering border effect [27], any point has the same probability to be inside a triangular hole as the origin O. This probability in a homogeneous setting is also equal to the proportion of the area of triangular holes. We borrow part of the line of proof from [15] where a similar problem is analyzed. We consider the probability that the origin O is inside a triangular hole. Since the length of each edge in the Rips complex must be at most, only the nodes within from the origin can contribute to the triangle which bounds a triangular hole containing the origin. Therefore, we only need to consider the PPP constrained in the closed ball B(O, ) which is also a homogeneous PPP with intensity λ. We denote this process as Φ. In addition, T (x, y, z) denotes the property that the origin O is inside the triangular hole bounded by the triangle with points x, y, z as vertices. When n, n 1, n 2 are points of the process Φ, T (n, n 1, n 2 ) is also used to denote the event that the triangle formed by the nodes n, n 1, n 2 bounds a triangular hole containing the origin. In addition, we use T (n, n 1, n 2 ) to denote the event that the nodes n, n 1, n 2 can not form a triangle which bounds a triangular hole containing the origin. Let τ = τ (Φ) be the node in the process Φ which is closest to the origin. There are two cases for the origin to be inside a triangular hole. The first case is that the node τ can contribute to a triangle which bounds a triangular hole containing the origin. The second case is that the node τ can not contribute to any triangle which bounds a triangular hole containing the origin but other three nodes can form a triangle which bounds a triangular hole containing the origin, as illustrated in Fig. 4. So the probability that the origin is inside a triangular hole can be defined as where p(λ, γ) = P{O is inside a triangular hole} = P{ T (n, n 1, n 2 )} = P{ {n,n 1,n 2} Φ {n 1,n 2} Φ\{τ (Φ)} p sec (λ, γ) = P{ {n,,n 4 } Φ\{τ (Φ)} T (τ, n 1, n 2 )} + p sec (λ, γ) T (n, n 1, n 2 ) T (τ, n 3, n 4 )} denotes the probability of the second case. p sec (λ, γ) is generally very small and obtained by simulations. In the following parts, we will analyze this probability in three different cases. B. Case < γ 3 Theorem 1. When < γ 3, p(λ, γ) =. Proof: It is a direct corollary from Lemma 2. (2)

5 YAN et al.: HOMOLOGY-BASED DISTRIBUTED COVERAGE HOLE DETECTION IN WIRELESS SENSOR NETWORKS 5! n 2 O Fig. 4. An example showing that the node closest to the origin τ does not contribute to a triangle which bounds a triangular hole containing the origin because the distance to n is larger than and the triangle formed by τ, n 1, n 2 does not contain O. In contrast, n, n 1, n 2 can form a triangle which bounds a triangular hole containing O. Here we assume the distance between τ and O is larger than R s. C. Case 3 < γ 2 Theorem 2. When 3 < γ 2, p l (λ, γ) < p(λ, γ) < p u (λ, γ), where n 1 Rc/ 3 p l (λ, γ) = 2πλ 2 r dr dθ 1 R s α r (3) e λπr2 e λ S + (r,θ 1) (1 e λ S (r,r 1,θ 1) )r 1 dr 1 and and p u (λ, γ) = 2πλ 2 Rc/ 3 R s r dr n α1 α1 α dθ 1 R1(r,θ 1) R1(r,θ 1) e λπr2 e λ S + (r,θ 1) (1 e λ S (r,r,θ 1) )r 1 dr 1 + p sec (λ, γ) α = 2 arccos( /(2r )) α 1 = 2 arcsin( /(2r )) 2 arccos( /(2r )) R 1 (r, θ 1 ) = min( Rc 2 r 2 sin2 θ 1 r cos θ 1, Rc 2 r 2 sin2 (θ 1 + α ) + r cos(θ 1 + α )) S + (r, θ 1 ) = S (r, r 1, θ 1 ) = θ1 R1(r,θ) rdrdθ α r α R2(r,r 1,θ 1,θ 2) θ 2l r r rdrdθ 2 θ 2l = θ 1 arccos cos(/r) cos θ 1 cos θ sin θ 1 sin θ R 2 (r, r 1, θ 1, θ 2 ) = min( Rc 2 r 2 sin2 θ 2 r cos θ 2, Rc 2 r1 2 sin2 (θ 2 θ 1 ) + r 1 cos(θ 2 θ 1 )) p sec (λ, γ) is obtained by simulations. Since the proof is tedious, we only give the idea and main steps here. See Appendix A for detailed computation. For the lower bound, we only consider the first case that the closest node τ can contribute to a triangle which bounds a triangular hole containing the origin. The main idea is to first fix the closest node τ, and then sequentially decide the (4) regions where the other two nodes may lie in, and finally do a triple integral. Using polar coordinates, we assume the closest node τ lies on (d, π). Once the node τ is determined, the other two nodes must lie in the different half spaces: one in H + = R + (, π) and the other in H = R + ( π, ). Assume n 1 lies in H + and n 2 lies in H. Since the distance to τ is at most, n 1 and n 2 must also lie in the ball B(τ, ). Furthermore, the distance to the origin is at most and larger than d, they should also lie in the region B(O, )\B(O, d ). Therefore, must lie in H + B(τ, ) B(O, )\B(O, d ) and n 1 n 2 must lie in H B(τ, ) B(O, )\B(O, d ). In addition, considering the distance between n 1 and n 2 should be at most and the origin should be inside the triangle formed by τ, n 1 and n 2, n 1 must lie in the shadow region A + = H + B(τ, ) B(O, )\B(O, d ) B(M 2, ), shown in Fig. 5. M 2 is one intersection point between the circle C(O, d ) and the circle C(τ, ), such intersection point must exist in this case since = γr s 2R s < 2d. H + H - Rc Rc Rc t (d, p) A + O t1 (d1, q1) Fig. 5. Illustration of regions A +, S + and S in the case 3 < γ 2 Ordering the nodes in A + by increasing polar angle so that τ 1 = (d 1, θ 1 ) has the smallest angle θ 1. And assume the nodes τ, τ 1 and another node τ 2 H B(τ, ) B(, )\B(, d ) can form a triangle which bounds a triangular hole containing the origin, then τ 2 must lie to the right of the line passing through τ 1 and O, denoted by H + (θ 1 ) which contains all points with polar angle θ (θ 1 π, θ 1 ). In addition, the distance to τ 1 is less than. So the node τ 2 must lie in the region S, as illustrated in Fig. 5. S (τ, τ 1 ) = S (d, d 1, θ 1 ) = H B(τ, ) B(, Rc )\B(, d ) H + (θ 1 ) B(τ 1, ) Assume only τ, τ 1 and nodes in S (τ, τ 1 ) can contribute to the triangle which bounds a triangular hole containing the origin, we can get a lower bound of the probability that the origin is inside a triangular hole. It is a lower bound because it is possible that τ 1 can not contribute to a triangle which bounds a triangular hole containing the origin, but some other nodes with higher polar angles in the region A + can contribute to such a triangle. E.g. in Fig. 6, if there is no node in S but there are some nodes in S, then τ 1 can not contribute Rc a a1 q1 M1 M2 S + S -

6 6 IEEE/ACM TRANSACTIONS ON NETWORKING to any triangle which bounds a triangular hole containing the origin, but τ 1 can form such a triangle with τ and another node in S. H + H - t Rc Rc Rc (d, p) Fig. 6. Illustration of regions S + and S in the case 3 < γ 2 A + O t 1 q1 S + t1 M1 M2 S + S - S - and and p u (λ, γ) = 2πλ 2{ /2 R s r dr π R 1 (r,θ1) dθ 1 e λπr2 e λ S + (r,θ 1) (1 e λ S (r,r,θ 1) )r 1 dr 1 Rc/ 3 R1(r,θ 1) α1 + r dr dθ 1 e λπr 2 /2 α r } e λ S+ (r,θ 1) (1 e λ S (r,r,θ 1) )r 1 dr 1 + p sec (λ, γ) R 1(r, θ 1 ) = min( Rc 2 r 2 sin2 θ 1 r cos θ 1, Rc 2 r 2 sin2 θ 1 + r cos θ 1 ) p sec (λ, γ) is obtained by simulations. r (6) Next we prove the upper bound. As discussed in Section IV-A, there are two cases for the origin being inside a triangular hole. As for the second case that the closest node τ can not but some other nodes can contribute to a triangle which bounds a triangular hole containing the origin, it is not easy to obtain a closed-form expression for such probability, we can get it by simulations. Simulation results show that this probability is less than.16% at any γ 3 with any intensity λ. So we still focus on the probability of the first case. Still consider the nodes in A +, each node (d, θ) corresponds to an area S (d, d, θ). The higher is the area S (d, d, θ), the higher is the probability that there is at least one node in S (d, d, θ), consequently the probability of the first case will be higher. It can be seen from Fig. 5 that the closer to θ 1 is θ and the closer to d is d 1, the higher is the area S (d, d, θ), so the largest area S (d, d, θ) is S (d, d, θ 1 ). Based on that, the upper bound can be derived. As can be seen, the expression for lower bound is closedform, while the expression for upper bound is not exactly closed-form since it includes a non-analytical part p sec (λ, γ). For lower bound and the closed-form part for upper bound, we use numerical integration to approximate the triple integrals. For p sec (λ, γ), we get it by simulations since it is generally very small, it has little impact on the derived upper bound. A + t R 1 c S + t (d, p) q 1 M O S - (a) A + t 1 S + t 1 S + t (d, p) q 1 M O S - S - D. Case γ > 2 Theorem 3. When γ > 2, p l (λ, γ) < p(λ, γ) < p u (λ, γ), where p l (λ, γ) = 2πλ 2{ /2 R s r dr π R 1 (r,θ1) dθ 1 e λπr2 e λ S + (r,θ 1) (1 e λ S (r,r 1,θ 1) )r 1 dr 1 Rc/ 3 R1(r,θ 1) α1 + r dr dθ 1 e λπr 2 /2 α r } e λ S+ (r,θ 1) (1 e λ S (r,r 1,θ 1) )r 1 dr 1 r (5) (b) Fig. 7. Illustrations of regions in case γ > 2. (a) the regions A +, S + and S (b) the regions S + and S In this case, we can use the same method as in Section IV-C to get the lower and upper bounds, shown in (5) and (6) respectively. But we need to consider two situations R s < d /2 and /2 < d / 3. In the first situation, d /2 means that the ball B(O, d ) is included in the ball B(τ, ). The illustrations for the regions A +, S +, S, S + and S are shown in Fig. 7. In addition, the lower limit of integration for θ 1 is and the upper limit is π. The second situation is the same as that in Section IV-C.

7 YAN et al.: HOMOLOGY-BASED DISTRIBUTED COVERAGE HOLE DETECTION IN WIRELESS SENSOR NETWORKS 7 V. DISTRIBUTED COVERAGE HOLE DETECTION ALGORITHM For non-triangular holes, we aim to design an efficient distributed algorithm to detect their minimum boundary cycles. The basic idea is that for the Rips complex of a WSN, we try to delete some vertices and edges without changing the homology while making the Rips complex more sparse and nearly planar. Then it is easy to find boundary edges (1-simplices), each of which has at most one neighbour. Finally such edges are connected in some order to form boundary cycles. More specifically, our algorithm includes five components: weight computation, vertex and edge deletion, boundary edge detection, coarse boundary cycles discovery and boundary cycles minimization, as shown in Fig. 8. An example is used to illustrate the procedures of this algorithm in Fig. 9. In weight computation component, the Rips complex of the WSN is first constructed, shown in Fig. 9(a), then each node computes its weight independently. The definition of weight of a node will be presented in the next part. After obtaining the weight, each node continues to determine whether it is deletable or not according to some rule defined hereafter. Fig. 9(b) shows the result of vertex deletion. Furthermore, some special edges may be deleted. Fig. 9(c) shows the process of such special edge deletion. After the second component, many boundary edges can be found, as the bold lines shown in Fig. 9(d). But it is possible that some other boundary edges have not been found. Then in the third component, all or nearly all boundary edges will be found after deleting some edges, see Fig. 9(e j). Then coarse boundary cycles can be easily discovered, as shown in Fig. 9(k). The found boundary cycles may not be minimum. In this case, coarse boundary cycles will be minimized in the final component as shown in Fig. 9(l). Start Weight computation Vertex and edge deletion Boundary edge detection Fig. 8. Flow chart of the algorithm A. Definitions Coarse boundary cycles discovery Boundary cycles minimization We say that a i-simplex [v i, v i1,..., v ii ]is part of a j-simplex [v j, v j1,..., v jj ] if [v i, v i1,..., v ii ] [v j, v j1,..., v jj ]. So the vertex [v ] and [v 1 ] is part of the edge [v, v 1 ]. The edge [v, v 1 ] is part of the triangle [v, v 1, v 2 ]. In addition, we use E(v) to denote all the edges that the node v is part of and T (v) to denote all the 2-simplices that the node v is part of. Definition 4 (Index of a 2-simplex). The index of a 2-simplex is the highest dimension of the simplex that the 2-simplex is part of, denoted by I. End Definition 5 (Weight of a node). The weight of a fence node is defined to be. For any internal node v, if there exists one edge in E(v) which is not part of any 2-simplex, the weight w v of node v is set to be ; if not, the weight is the minimum index of all the 2-simplices in T (v), that is w v = min T (v) I The weight of an internal node is an indicator of the density of surrounding nodes. If the weight of an internal node is, the node must be on the boundary of a coverage hole. The larger the weight is, the higher is the probability that the node is not on the boundary of a coverage hole. We also use the definition of simple-connectedness graph as in [28]. Let G be a simple graph with vertex set V (G) and edge set E(G). A cycle C is a sub-graph of G if it is connected and each vertex in C has degree two. The length of a cycle C is the number of its edges, denoted by E(C). The cycle space C(G) of a graph G contains all the cycles in G. The addition of two cycles C 1 and C 2 is defined as C 1 C 2 = (E(C 1 ) E(C 2 ))\(E(C 1 ) E(C 2 )). The triangle cycle subspace C T (G) of G is the set of all 3-length cycles in C(G). Definition 6 (Simple-Connectedness Graph). A connected graph G is of simple connectedness if its cycle space C(G) is empty, or for any cycle C in C(G), there exists a set of 3-length cycles T C T (G) such that C = T T T, which means all cycles in C(G) can be triangulated. Let X be a vertex (or edge) set in a graph G, we use G[X] to denote the vertex-induced (or edge-induced) sub-graph by X. The neighbour set of a vertex v in G is denoted by N G (v). The neighbouring graph Γ G (v) of vertex v is denoted as G[N G (v)]. The neighbouring graph Γ G (e) of an edge e = [u, v] is defined as G[N G (u) N G (v) {u, v}] e. The neighbour set of k- simplex [v, v 1,..., v k ] is defined as k i= N G(v i ). Definition 7 (Deletion of a k-simplex in Rips complex R(V)). A k-simplex [v, v 1,, v k ] is deleted in a Rips complex R(V) means that the simplex and all simplices which the simplex is part of are deleted from R(V). Based on definitions above, we can give the definition of HP (Homology Preserving) transformation. Definition 8 (HP Transformation). A HP transformation is a sequential combination of vertex (or edge) deletion as follows: a vertex (or edge) x of G is deletable if neighbouring graph Γ G (x) (1) has two or more vertices; (2) is connected and (3) is a simple-connectedness graph. Theorem 4. HP transformations do not change the number of coverage holes in Rips complex of a WSN. Proof: In order to prove HP transformations do not change the number of coverage holes in Rips complex of a WSN, we only need to prove that in the process of any HP transformation, there is no new coverage holes created and no two coverage holes merged. If a new coverage hole is created when a vertex v (or edge e) is deleted, then the boundary cycle of the new coverage hole must be a cycle in Γ G (v) (or Γ G (e)), which means Γ G (v) (or Γ G (e)) is not a simpleconnectedness graph. It is contrary to the third condition in

8 8 IEEE/ACM TRANSACTIONS ON NETWORKING (a) (b) (c) (d) (e) (f) (g) (h) (i) (j) (k) (l) Fig. 9. Procedures of the boundary detection algorithm. (a) Rips complex of a WSN, (b) after vertex deletion, (c d) edge deletion, (e j) boundary edge detection, (k) coarse boundary cycles discovery, (l) boundary cycles minimization HP transformation, so there is no new coverage hole created. Furthermore, if two coverage holes are merged when a vertex v (or edge e) is deleted, then the neighbour graph Γ G (v) (Γ G (e)) must not be connected, which is contrary to the second condition in HP transformation. So no two coverage holes are merged. The situations where two holes would merge after a vertex v deletion are shown in Fig. 1(a) and (b). Fig. 1(b) also shows the situation for edge e deletion. Consequently, the number of coverage holes will not be changed in the process of any HP transformation. (a) v Fig. 1. Illustration of merge of two holes when deleting a vertex or edge B. Weight computation In this component, each node first constructs its simplices to form the Rips complex of the WSN and then computes its weight. For any fence node, its weight is. For any internal node, theoretically the node needs to construct all the simplices e (b) v which it is part of. As we consider WSNs in a planar target field, each internal node only needs to construct all its 1- simplices and 2-simplices and their neighbours. This can also reduce the computation complexity. In order to do this, the node needs to obtain all its 1- and 2-hop neighbours information. This can be achieved by two broadcasts of hello message. In the first one, each node broadcasts its id. When it gets all the IDs of its 1-hop neighbours, it continues to broadcast a hello message containing the IDs of its 1-hop neighbours. After receiving the neighbour list of its neighbours, the node can obtain its E(v), the set of edges and T (v), the set of 2- simplices. It can also get the neighbours of each simplex. For any e E(v), let n(e) denote the neighbour set of e. For any t T (v), let n(t) denote the neighbour set of t. Then the weight of node v can be computed as in Algorithm 1. C. Vertex and edge deletion In this component, we conduct maximal vertex deletion without changing the number of coverage holes in the original WSN and also delete some special edges if such edges exist. For vertex deletion, we only consider internal nodes, fence nodes will never be deleted. 1) Vertex deletion: As explained in Section V-A, the larger the weight is, the higher is the probability that the node does

9 YAN et al.: HOMOLOGY-BASED DISTRIBUTED COVERAGE HOLE DETECTION IN WIRELESS SENSOR NETWORKS 9 Algorithm 1 Weight computation (for internal node v) Begin if e E(v), n(e) is empty then w v = else if t T (v), n(t) is empty then w v = 2 else w v = 3 end if END not lie on the boundary. Meanwhile, if the deletion of a vertex may create a new coverage hole, it must not be deleted no matter how high the weight is. So we have such a rule for vertex deletion. If the weight of a vertex is smaller than 3, it should never be deleted. Otherwise, the vertex continues to check whether it is deletable or not according to HP transformation. After the verification, the vertex broadcasts a message indicating that it can be deleted or not. After receiving the status of all its neighbours, each deletable vertex continues to check whether it should be deleted. The weight of any deletable vertex must be 3. We assume that the vertex with a lower ID has the priority to be deleted first. So each deletable vertex just needs to check whether its ID is the lowest among all its deletable neighbours. If so, it should be deleted. Otherwise, it should not be deleted. Algorithm 2 gives the detailed process for vertex deletion. According to the rule, two neighbouring vertices will not be deleted simultaneously, so each vertex can make the decision independently. When a vertex is deleted, it broadcasts a message to its neighbours. All its neighbours will modify their simplices accordingly and compute their weights again. The procedure of vertex deletion terminates until no vertex can be deleted in the Rips complex. Fig. 9(b) gives the final result after vertex deletion. Algorithm 2 Vertex deletion (for internal node v) Begin if w v < 3 then node v can not be deleted else if node v is not deletable according to HP transformation then node v can not be deleted else if the ID of node v is the smallest among all its deletable neighbours then node v is deleted end if END 2) Edge deletion: After vertex deletion, it seems natural to delete all edges which are deletable according to HP transformation. We do not run in this way. On one hand, this may not be useful since deleting edges which are far from coverage holes does not help the detection of boundary cycles of coverage holes. On the other hand, deleting all such edges will increase the complexity of the algorithm. Fortunately, it has been proven in [29] that it is possible to make the Rips complex planar by deleting vertices and edges if there is no hole in the Rips complex. For a planar Rips complex, the edge which has at most one neighbour must be on the boundary. This inspires us to check the edges which have at most one neighbour even if it may not be easy to make a Rips complex planar when the Rips complex has holes. It is interesting to find that most edges which have at most one neighbour lie on the boundary of a coverage hole, such as the solid bold edges shown in Fig. 9(c). But there exist also some special such edges not lying on the boundary, such as the dashed bold edges shown in Fig. 9(c). We try to delete such special edges. We call edges having at most one neighbour as boundary edges, and call boundary edges not lying on the boundary of a coverage hole as special boundary edges. Considering that special boundary edges do not lie on the boundary of a coverage hole, deleting them will not produce new boundary edges. Then we design a rule for deleting special boundary edges. For a boundary edge [u, v] which has only one neighbour w 1, if deleting [u, v] will not make [u, w] and [v, w] be boundary edges, then the edge [u, v] can be deleted. We can check that the rule is HP since the neighbouring graph of the edge [u, v] is connected with three vertices u, v, w and without a cycle. It means that deletion of such edges does not change the number of coverage holes in Rips complex. Fig. 11 shows the result of deleting such edges, which is an enlarged version of Fig. 9(c). Some edges lying on the boundary may also be deleted according to the rule. This is not a big issue, because deletion of such edges just enlarges the current coverage holes. It can be solved in the boundary cycles minimization component. After edge deletion, some vertices may be deleted again, such as the vertex denoted by a bold square in Fig. 9(c). If such a case happens, we can continue to do vertex deletion until no more vertex or edge can be deleted. Fig. 9(d) shows the result after edge deletion. Fig. 11. Special boundary edge deletion D. Boundary edge detection As explained in last section, in a planar Rips complex, it is easy to detect all boundary edges by checking whether they have at most one neighbour or not. Then boundary edges are connected sequentially to form boundary cycles. It is thus important to detect boundary edges. In our case, after last step, we can find that some edges lying on the boundary have 1 The boundary edge having no neighbour must be on the boundary.

10 1 IEEE/ACM TRANSACTIONS ON NETWORKING not been found. This is due to that the Rips complex near coverage holes is not planar. We try to make it planar. We consider the nodes having one or more boundary edges as boundary nodes and other nodes as non-boundary nodes. First, we need to delete some edges connecting non-boundary nodes and boundary nodes according to HP transformation, such as the dashed bold edges shown in Fig. 9(e). After that, some new boundary edges may be recognized as shown in Fig. 9(f). But it is possible that the new found boundary edges cross with non-boundary edges, as the dashed bold edge in coverage hole 5 in Fig. 9(h), or cross with each other, as the dashed bold edges in coverage holes 1 and 2 in Fig. 9(h). As for the case in coverage hole 5, we can design a similar rule as in last step to delete them. Considering such edges are near the boundary of a coverage hole, deletion of them can make new boundary edges, we design the rule as follows: for a boundary edge [u, v], it has one neighbour w, [u, w] and [v, w] are not boundary edges, if the deletion of the edge [u, v] can make at least one of the two edges [u, w] and [v, w] be boundary edge, then [u, v] can be deleted. Such a rule is HP as explained in last component. As for the crossing boundary edges case, it is illustrated in the next paragraph. Second, we need to delete some edges connecting boundary nodes according to HP transformation, such as the dashed bold edge in Fig. 9(g). Considering that crossing edges can only exist in 3- or higher dimension simplices, and higer dimension simplices can transfer to several 3-simplices by deleting some edges. We thus only consider 3-simplices, an example is shown in Fig. 12(a). Deleting one edge of a 3-simplex can produce three possible crossing boundary edges cases 2, as shown in the top part of Fig. 12 (b) (d), where bold lines denote boundary edges and other ones denote non-boundary edges. Then we can design corresponding rules to delete some boundary edges. The bottom parts of Fig. 12 (b) (d) give the results after deletion. The rules are also HP as explained in last component. (a) v v v v v (b) (c) (d) Fig. 12. Illustration of crossing boundary edges According to such rules, some boundary edges can be deleted, such as the dashed bold edges in Fig. 9(i). From Fig. 9(i), it can be found that certain boundary edge is deleted incorrectly. It is not a big issue as explained in last component. After deletion of such edges, new boundary edges can be found as shown in Fig. 9(j). In general, after the process above, all boundary edges can be found. But there exists one special case as in Fig. 13(a), where some boundary edges can not be detected. This is due to that for a vertex v, as in Fig. 13(b), its neighbouring graph is not a simple-connected graph since the cycle formed by 2 Here we do not consider the case without crossing boundary edges v v 1, v 2, v 3, v 4 can not be triangulated, but the cycle can be triangulated in the graph induced by v 1, v 2, v 3, v 4, u. In this case, no vertex or edge is deletable according to HP transformation and no boundary edges can be found since each edge has two neighbours. Such case has no impact on boundary cycles detection, as illustrated in the next component. (a) v 1 v 2 v u (b) Fig. 13. Special case when some boundary edges can not be detected E. Coarse boundary cycles discovery v 4 v 3 After boundary edges are detected in the former component, it is easy to discover the coarse boundary cycles. We just need to randomly choose one node which has two boundary edges in any boundary cycle. The node initiates the process to find the coarse boundary cycle by sending a message along one of the boundary edges. Then the boundary neighbour continues sending the message along its boundary edges. When the initiating node receives the message coming back along the other boundary edge, it discovers one coarse boundary cycle. Similarly, all coarse boundary cycles can be found, as shown in Fig. 9(k). If only part of boundary edges are detected after former components, we can not transmit the message only along boundary edges. The message will be also transmitted along non-boundary edges and some non-boundary nodes will also need to broadcast the message, which increases the complexity of the algorithm. As for the special case shown in Fig. 13(a), when the node v receives a message from its boundary neighbour node u, it broadcasts the message to all its neighbours except u. If its neighbour node is a boundary node, then the message can be sent along the boundary edges. If its neighbour node is not a boundary node but it has boundary neighbour nodes, then it can send the message to its boundary neighbour nodes. Else, it will not transmit the message again. In this way, the message goes along boundary edges most of the time and can return to the original node initiating the message. F. Boundary cycles minimization It is possible that some coarse boundary cycles found are not minimum, so we need to minimize such cycles. This can be achieved by checking whether there exists a shorter path between any two nodes in the cycle. Since each node has its 1- and 2-hop neighbours information, it can locally check the existence of a shorter path in the cycle in general cases. If there exists, we shorten the cycle and continue to do the same verification until no such case exists. After that, it is

11 YAN et al.: HOMOLOGY-BASED DISTRIBUTED COVERAGE HOLE DETECTION IN WIRELESS SENSOR NETWORKS 11 still possible some cycle has not been minimized, such as the coverage hole 2 in Fig. 9(k). So we use the following 2-hop shrinking process to shorten the cycle. For any four adjacent nodes in the cycle, say a, b, c, d, if there exists one node x which is one common neighbour of nodes a, b, c, d, then the cycle can be shortened by using x to replace nodes b and c. In this way, we can nearly obtain most minimum cycles surrounding coverage holes. In some cases, we can not get the minimum cycles since each node only has its 1- and 2-hop neighbours information. Even so, the boundary cycles discovered in the algorithm can still provide valuable information about coverage holes. VI. SIMULATIONS AND PERFORMANCE EVALUATION Performance evaluation of the theoretical bounds obtained in Section IV and the algorithm proposed in Section V is presented in this section. A. Simulation settings For bounds evaluation, a disk centered at the origin with radius is considered in the simulations. The probability that the origin is inside a triangular hole is computed. Sensors are randomly distributed in the disk according to a Poisson point process with intensity λ. The sensing radius R s of each node is set to be 1 meters and γ is chosen from 2 to 3 with interval of.2. So the communication radius ranges from 2 to 3 meters with interval of 2 meters. λ is selected from.1 to.2 with interval of.1. For each γ, 1 7 simulations are run under each λ to check whether the origin belongs to a triangular hole. For performance evaluation of the algorithm, we choose a 1 1 m 2 square area as the target field. The sensing radius R s of each node is 1 meters. The communication radius is set to be 2 meters and so γ = 2. There are fence sensors locating along the edges of the square with 2 meters distance between neighbours. Other internal sensors are randomly distributed in the area according to a Poisson point process with intensity λ. B. Proportion of the area of triangular holes The probability p(λ, γ) obtained by simulations is presented with the lower and upper bounds in Fig. 14(a) and 14(b) respectively. The simulation results for p sec (λ, γ) are shown in Fig. 15, which indicate that p sec (λ, γ) is always smaller than.16% in the simulation settings. It can be seen from Fig. 14 that for any value of γ, p(λ, γ) has a maximum at a threshold value λ c of the intensity. As a matter of fact, for λ λ c, the number of nodes is small. Consequently the probability that the origin belongs to a triangular hole is relatively small too. With the increase of λ, the connectivity between nodes becomes stronger. As a result, the probability that the origin belongs to a triangular hole increases. However, when the intensity reaches the threshold value, the origin is covered with maximum probability. p(λ, γ) decreases for λ λ c. The simulations also show that λ c decreases with the increase of γ. On the other hand, it can be seen from Fig. 14(a) and 14(b) that for a fixed intensity λ, p(λ, γ) increases with the increases of γ. That is because when R s is fixed, the larger is, the higher is the probability of each triangle containing a coverage hole. Furthermore, the maximum probability increases quickly with γ ranging from 2. to 3.. It is shown that when γ = 2, the maximum probability from simulation is about.3% and thus it is acceptable to use Rips complex based algorithms to discover coverage holes. While the ratio γ is high to a certain extent, it is unacceptable to use connectivity information only to discover coverage holes. Finally, it can be found in Fig. 14(a) that the probability obtained by simulation is very well consistent with the lower bound. The maximum difference between them is about.5%. Fig. 14(b) shows that probability obtained by simulation is also consistent with the upper bound. The maximum difference between them is about 3%. In addition, combined with the homology based algorithm, the analytical results can be used for planning of WSNs. For example, assume a WSN is used to monitor a planar target field and the ratio γ = 2, according to the analytical upper bounds, we can see that the maximum proportion of the area of triangular holes under γ = 2 is about.6%, which can be neglected. It means that as long as the non-triangular holes can be detected by the homology based algorithm and covered by additional nodes, we can say the target field is covered. But if γ = 3, it can be seen from the analytical upper bounds that the maximum proportion of the area of triangular holes is about 11%, which means that even if the non-triangular holes can be detected and covered, it is still possible that about 11% of the target field is uncovered. Under this situation, some approaches like increasing the intensity of nodes need to be used in order to make most of the target field covered. C. Performance of the algorithm 1) Complexity: The computation complexity of each step in the algorithm is shown in Table I. In weight computation, each node needs to construct its -, 1- and 2-simplices. For construction of - and 1-simplices, each node only needs to know its 1-hop neighbour information, which can be done by a broadcast as explained in Section V-B. For 2-simplices construction, each node needs to obtain its neighbours 1- hop neighbour information, which is achieved by another broadcast. Then the node continues to determine whether it can form a 2-simplex with any two of its neighbours by checking whether they have a common neighbour. The node needs to check n(n 1)/2 times, where n is the number of its 1-hop neighbours. Then the node computes its weight by checking all its 2-simplices of which the maximum number is n(n 1)/2. The computation complexity of this component is thus O(n 2 ). In vertex deletion part, each node needs to check whether it is deletable or not according to HP transformation. This can be done by checking all its cycles in its neighbouring graph. It can build a spanning tree in its neighbouring graph and check all fundamental cycles in the spanning tree. There are E n + 1 fundamental cycles, where E is the number of edges in its

Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks

Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks Feng Yan, Philippe Martins, Laurent Decreusefond To cite this version: Feng Yan, Philippe Martins, Laurent Decreusefond.

More information

Simplicial Complexes: Second Lecture

Simplicial Complexes: Second Lecture Simplicial Complexes: Second Lecture 4 Nov, 2010 1 Overview Today we have two main goals: Prove that every continuous map between triangulable spaces can be approximated by a simplicial map. To do this,

More information

Computing the k-coverage of a wireless network

Computing the k-coverage of a wireless network Computing the k-coverage of a wireless network Anaïs Vergne, Laurent Decreusefond, and Philippe Martins LTCI, Télécom ParisTech, Université Paris-Saclay, 75013, Paris, France arxiv:1901.00375v1 [cs.ni]

More information

Building a coverage hole-free communication tree

Building a coverage hole-free communication tree Building a coverage hole-free communication tree Anaïs Vergne, Laurent Decreusefond, and Philippe Martins LTCI, Télécom ParisTech, Université Paris-Saclay, 75013, Paris, France arxiv:1802.08442v1 [cs.ni]

More information

Pebble Sets in Convex Polygons

Pebble Sets in Convex Polygons 2 1 Pebble Sets in Convex Polygons Kevin Iga, Randall Maddox June 15, 2005 Abstract Lukács and András posed the problem of showing the existence of a set of n 2 points in the interior of a convex n-gon

More information

Voronoi Diagram. Xiao-Ming Fu

Voronoi Diagram. Xiao-Ming Fu Voronoi Diagram Xiao-Ming Fu Outlines Introduction Post Office Problem Voronoi Diagram Duality: Delaunay triangulation Centroidal Voronoi tessellations (CVT) Definition Applications Algorithms Outlines

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

On Pairwise Connectivity of Wireless Multihop Networks

On Pairwise Connectivity of Wireless Multihop Networks On Pairwise Connectivity of Wireless Multihop Networks Fangting Sun and Mark Shayman Department of Electrical and Computer Engineering University of Maryland, College Park, MD 2742 {ftsun, shayman}@eng.umd.edu

More information

A convenient way to construct large simplicial complexes is through specifying sets and recording their intersection patterns.

A convenient way to construct large simplicial complexes is through specifying sets and recording their intersection patterns. III.2 Convex Set Systems 53 III.2 Convex Set Systems A convenient way to construct large simplicial complexes is through specifying sets and recording their intersection patterns. Nerves. Let F be a finite

More information

However, this is not always true! For example, this fails if both A and B are closed and unbounded (find an example).

However, this is not always true! For example, this fails if both A and B are closed and unbounded (find an example). 98 CHAPTER 3. PROPERTIES OF CONVEX SETS: A GLIMPSE 3.2 Separation Theorems It seems intuitively rather obvious that if A and B are two nonempty disjoint convex sets in A 2, then there is a line, H, separating

More information

Surface Mesh Generation

Surface Mesh Generation Surface Mesh Generation J.-F. Remacle Université catholique de Louvain September 22, 2011 0 3D Model For the description of the mesh generation process, let us consider the CAD model of a propeller presented

More information

Lecture-12: Closed Sets

Lecture-12: Closed Sets and Its Examples Properties of Lecture-12: Dr. Department of Mathematics Lovely Professional University Punjab, India October 18, 2014 Outline Introduction and Its Examples Properties of 1 Introduction

More information

Simplicial Homology for Future Cellular Networks

Simplicial Homology for Future Cellular Networks Simplicial Homology for Future Cellular Networks Anaïs Vergne, Laurent Decreusefond, Philippe Martins, Senior Member, IEEE arxiv:3.664v4 [cs.ni] Sep 4 Abstract Simplicial homology is a tool that provides

More information

Homology and Persistent Homology Bootcamp Notes 2017

Homology and Persistent Homology Bootcamp Notes 2017 Homology and Persistent Homology Bootcamp Notes Summer@ICERM 2017 Melissa McGuirl September 19, 2017 1 Preface This bootcamp is intended to be a review session for the material covered in Week 1 of Summer@ICERM

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

Simplicial Hyperbolic Surfaces

Simplicial Hyperbolic Surfaces Simplicial Hyperbolic Surfaces Talk by Ken Bromberg August 21, 2007 1-Lipschitz Surfaces- In this lecture we will discuss geometrically meaningful ways of mapping a surface S into a hyperbolic manifold

More information

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 HAI THANH MAI AND MYOUNG HO KIM Department of Computer Science Korea Advanced Institute of Science

More information

Estimating the Free Region of a Sensor Node

Estimating the Free Region of a Sensor Node Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We

More information

Orientation of manifolds - definition*

Orientation of manifolds - definition* Bulletin of the Manifold Atlas - definition (2013) Orientation of manifolds - definition* MATTHIAS KRECK 1. Zero dimensional manifolds For zero dimensional manifolds an orientation is a map from the manifold

More information

Voronoi Diagrams and Delaunay Triangulations. O Rourke, Chapter 5

Voronoi Diagrams and Delaunay Triangulations. O Rourke, Chapter 5 Voronoi Diagrams and Delaunay Triangulations O Rourke, Chapter 5 Outline Preliminaries Properties and Applications Computing the Delaunay Triangulation Preliminaries Given a function f: R 2 R, the tangent

More information

Preferred directions for resolving the non-uniqueness of Delaunay triangulations

Preferred directions for resolving the non-uniqueness of Delaunay triangulations Preferred directions for resolving the non-uniqueness of Delaunay triangulations Christopher Dyken and Michael S. Floater Abstract: This note proposes a simple rule to determine a unique triangulation

More information

Straight-Line Drawings of 2-Outerplanar Graphs on Two Curves

Straight-Line Drawings of 2-Outerplanar Graphs on Two Curves Straight-Line Drawings of 2-Outerplanar Graphs on Two Curves (Extended Abstract) Emilio Di Giacomo and Walter Didimo Università di Perugia ({digiacomo,didimo}@diei.unipg.it). Abstract. We study how to

More information

arxiv: v2 [cs.cg] 24 Jul 2011

arxiv: v2 [cs.cg] 24 Jul 2011 Ice-Creams and Wedge Graphs Eyal Ackerman Tsachik Gelander Rom Pinchasi Abstract arxiv:116.855v2 [cs.cg] 24 Jul 211 What is the minimum angle α > such that given any set of α-directional antennas (that

More information

Computational Geometry

Computational Geometry Lecture 12: Lecture 12: Motivation: Terrains by interpolation To build a model of the terrain surface, we can start with a number of sample points where we know the height. Lecture 12: Motivation: Terrains

More information

Crossing Families. Abstract

Crossing Families. Abstract Crossing Families Boris Aronov 1, Paul Erdős 2, Wayne Goddard 3, Daniel J. Kleitman 3, Michael Klugerman 3, János Pach 2,4, Leonard J. Schulman 3 Abstract Given a set of points in the plane, a crossing

More information

ROBOT MOTION USING DELAUNAY TRIANGULATION

ROBOT MOTION USING DELAUNAY TRIANGULATION ROBOT MOTION USING DELAUNAY TRIANGULATION by Ioana-Maria Ileană Abstract. Robot motion is nowadays studied from a lot of different perspectives. This paper is based on the assumption of a fully known environment,

More information

Computational Geometry for Imprecise Data

Computational Geometry for Imprecise Data Computational Geometry for Imprecise Data November 30, 2008 PDF Version 1 Introduction Computational geometry deals with algorithms on geometric inputs. Historically, geometric algorithms have focused

More information

Topology 550A Homework 3, Week 3 (Corrections: February 22, 2012)

Topology 550A Homework 3, Week 3 (Corrections: February 22, 2012) Topology 550A Homework 3, Week 3 (Corrections: February 22, 2012) Michael Tagare De Guzman January 31, 2012 4A. The Sorgenfrey Line The following material concerns the Sorgenfrey line, E, introduced in

More information

Processing 3D Surface Data

Processing 3D Surface Data Processing 3D Surface Data Computer Animation and Visualisation Lecture 17 Institute for Perception, Action & Behaviour School of Informatics 3D Surfaces 1 3D surface data... where from? Iso-surfacing

More information

66 III Complexes. R p (r) }.

66 III Complexes. R p (r) }. 66 III Complexes III.4 Alpha Complexes In this section, we use a radius constraint to introduce a family of subcomplexes of the Delaunay complex. These complexes are similar to the Čech complexes but differ

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Which n-venn diagrams can be drawn with convex k-gons?

Which n-venn diagrams can be drawn with convex k-gons? Which n-venn diagrams can be drawn with convex k-gons? Jeremy Carroll Frank Ruskey Mark Weston Abstract We establish a new lower bound for the number of sides required for the component curves of simple

More information

Delaunay Triangulations

Delaunay Triangulations Delaunay Triangulations (slides mostly by Glenn Eguchi) Motivation: Terrains Set of data points A R 2 Height ƒ(p) defined at each point p in A How can we most naturally approximate height of points not

More information

The Farthest Point Delaunay Triangulation Minimizes Angles

The Farthest Point Delaunay Triangulation Minimizes Angles The Farthest Point Delaunay Triangulation Minimizes Angles David Eppstein Department of Information and Computer Science UC Irvine, CA 92717 November 20, 1990 Abstract We show that the planar dual to the

More information

K 4,4 e Has No Finite Planar Cover

K 4,4 e Has No Finite Planar Cover K 4,4 e Has No Finite Planar Cover Petr Hliněný Dept. of Applied Mathematics, Charles University, Malostr. nám. 25, 118 00 Praha 1, Czech republic (E-mail: hlineny@kam.ms.mff.cuni.cz) February 9, 2005

More information

4. Simplicial Complexes and Simplicial Homology

4. Simplicial Complexes and Simplicial Homology MATH41071/MATH61071 Algebraic topology Autumn Semester 2017 2018 4. Simplicial Complexes and Simplicial Homology Geometric simplicial complexes 4.1 Definition. A finite subset { v 0, v 1,..., v r } R n

More information

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY KARL L. STRATOS Abstract. The conventional method of describing a graph as a pair (V, E), where V and E repectively denote the sets of vertices and edges,

More information

Distributed Algorithm for Voronoi Partition of Wireless Sensor Networks with a Limited Sensing Range

Distributed Algorithm for Voronoi Partition of Wireless Sensor Networks with a Limited Sensing Range sensors Article Distributed Algorithm for Voronoi Partition of Wireless Sensor Networks with a Limited Sensing Range Chenlong He 1, * ID, Zuren Feng 1 and Zhigang Ren 2 1 State Key Laboratory for Manufacturing

More information

Manifolds. Chapter X. 44. Locally Euclidean Spaces

Manifolds. Chapter X. 44. Locally Euclidean Spaces Chapter X Manifolds 44. Locally Euclidean Spaces 44 1. Definition of Locally Euclidean Space Let n be a non-negative integer. A topological space X is called a locally Euclidean space of dimension n if

More information

Delaunay Triangulations. Presented by Glenn Eguchi Computational Geometry October 11, 2001

Delaunay Triangulations. Presented by Glenn Eguchi Computational Geometry October 11, 2001 Delaunay Triangulations Presented by Glenn Eguchi 6.838 Computational Geometry October 11, 2001 Motivation: Terrains Set of data points A R 2 Height ƒ(p) defined at each point p in A How can we most naturally

More information

The Cyclic Cycle Complex of a Surface

The Cyclic Cycle Complex of a Surface The Cyclic Cycle Complex of a Surface Allen Hatcher A recent paper [BBM] by Bestvina, Bux, and Margalit contains a construction of a cell complex that gives a combinatorial model for the collection of

More information

Computational Geometry

Computational Geometry Lecture 1: Introduction and convex hulls Geometry: points, lines,... Geometric objects Geometric relations Combinatorial complexity Computational geometry Plane (two-dimensional), R 2 Space (three-dimensional),

More information

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs Advanced Operations Research Techniques IE316 Quiz 1 Review Dr. Ted Ralphs IE316 Quiz 1 Review 1 Reading for The Quiz Material covered in detail in lecture. 1.1, 1.4, 2.1-2.6, 3.1-3.3, 3.5 Background material

More information

APPROXIMATING THE MAXMIN AND MINMAX AREA TRIANGULATIONS USING ANGULAR CONSTRAINTS. J. Mark Keil, Tzvetalin S. Vassilev

APPROXIMATING THE MAXMIN AND MINMAX AREA TRIANGULATIONS USING ANGULAR CONSTRAINTS. J. Mark Keil, Tzvetalin S. Vassilev Serdica J. Computing 4 00, 3 334 APPROXIMATING THE MAXMIN AND MINMAX AREA TRIANGULATIONS USING ANGULAR CONSTRAINTS J. Mark Keil, Tzvetalin S. Vassilev Abstract. We consider sets of points in the two-dimensional

More information

The Geodesic Integral on Medial Graphs

The Geodesic Integral on Medial Graphs The Geodesic Integral on Medial Graphs Kolya Malkin August 013 We define the geodesic integral defined on paths in the duals of medial graphs on surfaces and use it to study lens elimination and connection

More information

Lecture notes for Topology MMA100

Lecture notes for Topology MMA100 Lecture notes for Topology MMA100 J A S, S-11 1 Simplicial Complexes 1.1 Affine independence A collection of points v 0, v 1,..., v n in some Euclidean space R N are affinely independent if the (affine

More information

Lecture 2 - Introduction to Polytopes

Lecture 2 - Introduction to Polytopes Lecture 2 - Introduction to Polytopes Optimization and Approximation - ENS M1 Nicolas Bousquet 1 Reminder of Linear Algebra definitions Let x 1,..., x m be points in R n and λ 1,..., λ m be real numbers.

More information

G 6i try. On the Number of Minimal 1-Steiner Trees* Discrete Comput Geom 12:29-34 (1994)

G 6i try. On the Number of Minimal 1-Steiner Trees* Discrete Comput Geom 12:29-34 (1994) Discrete Comput Geom 12:29-34 (1994) G 6i try 9 1994 Springer-Verlag New York Inc. On the Number of Minimal 1-Steiner Trees* B. Aronov, 1 M. Bern, 2 and D. Eppstein 3 Computer Science Department, Polytechnic

More information

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1

More information

A Versatile Dependent Model for Heterogeneous Cellular Networks

A Versatile Dependent Model for Heterogeneous Cellular Networks 1 A Versatile Dependent Model for Heterogeneous Cellular Networks Martin Haenggi University of Notre Dame July 7, 1 Abstract arxiv:135.97v [cs.ni] 7 May 13 We propose a new model for heterogeneous cellular

More information

Lecture 15: The subspace topology, Closed sets

Lecture 15: The subspace topology, Closed sets Lecture 15: The subspace topology, Closed sets 1 The Subspace Topology Definition 1.1. Let (X, T) be a topological space with topology T. subset of X, the collection If Y is a T Y = {Y U U T} is a topology

More information

Processing 3D Surface Data

Processing 3D Surface Data Processing 3D Surface Data Computer Animation and Visualisation Lecture 12 Institute for Perception, Action & Behaviour School of Informatics 3D Surfaces 1 3D surface data... where from? Iso-surfacing

More information

Summary of Coverage Problems in Wireless Ad-hoc Sensor Networks

Summary of Coverage Problems in Wireless Ad-hoc Sensor Networks Summary of Coverage Problems in Wireless Ad-hoc Sensor Networks Laura Kneckt 21th of March, 2005 Abstract This paper presents a brief summary of the article about Coverage Problems in Wireless Ad-hoc Sensor

More information

Gergonne and Nagel Points for Simplices in the n-dimensional Space

Gergonne and Nagel Points for Simplices in the n-dimensional Space Journal for Geometry and Graphics Volume 4 (2000), No. 2, 119 127. Gergonne and Nagel Points for Simplices in the n-dimensional Space Edwin Koźniewsi 1, Renata A. Górsa 2 1 Institute of Civil Engineering,

More information

Voronoi diagrams Delaunay Triangulations. Pierre Alliez Inria

Voronoi diagrams Delaunay Triangulations. Pierre Alliez Inria Voronoi diagrams Delaunay Triangulations Pierre Alliez Inria Voronoi Diagram Voronoi Diagram Voronoi Diagram The collection of the non-empty Voronoi regions and their faces, together with their incidence

More information

7. The Gauss-Bonnet theorem

7. The Gauss-Bonnet theorem 7. The Gauss-Bonnet theorem 7.1 Hyperbolic polygons In Euclidean geometry, an n-sided polygon is a subset of the Euclidean plane bounded by n straight lines. Thus the edges of a Euclidean polygon are formed

More information

Approximating Polygonal Objects by Deformable Smooth Surfaces

Approximating Polygonal Objects by Deformable Smooth Surfaces Approximating Polygonal Objects by Deformable Smooth Surfaces Ho-lun Cheng and Tony Tan School of Computing, National University of Singapore hcheng,tantony@comp.nus.edu.sg Abstract. We propose a method

More information

Topological properties of convex sets

Topological properties of convex sets Division of the Humanities and Social Sciences Ec 181 KC Border Convex Analysis and Economic Theory Winter 2018 Topic 5: Topological properties of convex sets 5.1 Interior and closure of convex sets Let

More information

Lifting Transform, Voronoi, Delaunay, Convex Hulls

Lifting Transform, Voronoi, Delaunay, Convex Hulls Lifting Transform, Voronoi, Delaunay, Convex Hulls Subhash Suri Department of Computer Science University of California Santa Barbara, CA 93106 1 Lifting Transform (A combination of Pless notes and my

More information

Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks

Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks 1 Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks Paul Balister Zizhan Zheng Santosh Kumar Prasun Sinha University of Memphis The Ohio State University {pbalistr,santosh.kumar}@memphis.edu

More information

CS133 Computational Geometry

CS133 Computational Geometry CS133 Computational Geometry Voronoi Diagram Delaunay Triangulation 5/17/2018 1 Nearest Neighbor Problem Given a set of points P and a query point q, find the closest point p P to q p, r P, dist p, q dist(r,

More information

EXTREME POINTS AND AFFINE EQUIVALENCE

EXTREME POINTS AND AFFINE EQUIVALENCE EXTREME POINTS AND AFFINE EQUIVALENCE The purpose of this note is to use the notions of extreme points and affine transformations which are studied in the file affine-convex.pdf to prove that certain standard

More information

Computational Geometry

Computational Geometry Computational Geometry 600.658 Convexity A set S is convex if for any two points p, q S the line segment pq S. S p S q Not convex Convex? Convexity A set S is convex if it is the intersection of (possibly

More information

INTRODUCTION TO THE HOMOLOGY GROUPS OF COMPLEXES

INTRODUCTION TO THE HOMOLOGY GROUPS OF COMPLEXES INTRODUCTION TO THE HOMOLOGY GROUPS OF COMPLEXES RACHEL CARANDANG Abstract. This paper provides an overview of the homology groups of a 2- dimensional complex. It then demonstrates a proof of the Invariance

More information

Ice-Creams and Wedge Graphs

Ice-Creams and Wedge Graphs Ice-Creams and Wedge Graphs Eyal Ackerman Tsachik Gelander Rom Pinchasi Abstract What is the minimum angle α > such that given any set of α-directional antennas (that is, antennas each of which can communicate

More information

Geometry. Every Simplicial Polytope with at Most d + 4 Vertices Is a Quotient of a Neighborly Polytope. U. H. Kortenkamp. 1.

Geometry. Every Simplicial Polytope with at Most d + 4 Vertices Is a Quotient of a Neighborly Polytope. U. H. Kortenkamp. 1. Discrete Comput Geom 18:455 462 (1997) Discrete & Computational Geometry 1997 Springer-Verlag New York Inc. Every Simplicial Polytope with at Most d + 4 Vertices Is a Quotient of a Neighborly Polytope

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Lecture 5: Duality Theory

Lecture 5: Duality Theory Lecture 5: Duality Theory Rajat Mittal IIT Kanpur The objective of this lecture note will be to learn duality theory of linear programming. We are planning to answer following questions. What are hyperplane

More information

Convex hulls of spheres and convex hulls of convex polytopes lying on parallel hyperplanes

Convex hulls of spheres and convex hulls of convex polytopes lying on parallel hyperplanes Convex hulls of spheres and convex hulls of convex polytopes lying on parallel hyperplanes Menelaos I. Karavelas joint work with Eleni Tzanaki University of Crete & FO.R.T.H. OrbiCG/ Workshop on Computational

More information

FACES OF CONVEX SETS

FACES OF CONVEX SETS FACES OF CONVEX SETS VERA ROSHCHINA Abstract. We remind the basic definitions of faces of convex sets and their basic properties. For more details see the classic references [1, 2] and [4] for polytopes.

More information

Conjectures concerning the geometry of 2-point Centroidal Voronoi Tessellations

Conjectures concerning the geometry of 2-point Centroidal Voronoi Tessellations Conjectures concerning the geometry of 2-point Centroidal Voronoi Tessellations Emma Twersky May 2017 Abstract This paper is an exploration into centroidal Voronoi tessellations, or CVTs. A centroidal

More information

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem Chapter 8 Voronoi Diagrams 8.1 Post Oce Problem Suppose there are n post oces p 1,... p n in a city. Someone who is located at a position q within the city would like to know which post oce is closest

More information

Improved Results on Geometric Hitting Set Problems

Improved Results on Geometric Hitting Set Problems Improved Results on Geometric Hitting Set Problems Nabil H. Mustafa nabil@lums.edu.pk Saurabh Ray saurabh@cs.uni-sb.de Abstract We consider the problem of computing minimum geometric hitting sets in which,

More information

We have set up our axioms to deal with the geometry of space but have not yet developed these ideas much. Let s redress that imbalance.

We have set up our axioms to deal with the geometry of space but have not yet developed these ideas much. Let s redress that imbalance. Solid geometry We have set up our axioms to deal with the geometry of space but have not yet developed these ideas much. Let s redress that imbalance. First, note that everything we have proven for the

More information

demand point given tracks

demand point given tracks 2 Introduction Establishing stops (or stations) within a transportation network is fundamental for offering public transportation service, since stops are an important part of the PTN. But it is not clear

More information

Midpoint Routing algorithms for Delaunay Triangulations

Midpoint Routing algorithms for Delaunay Triangulations Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School of Information Technologies Prologue The practical

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

Simplicial Global Optimization

Simplicial Global Optimization Simplicial Global Optimization Julius Žilinskas Vilnius University, Lithuania September, 7 http://web.vu.lt/mii/j.zilinskas Global optimization Find f = min x A f (x) and x A, f (x ) = f, where A R n.

More information

Differential Geometry: Circle Patterns (Part 1) [Discrete Conformal Mappinngs via Circle Patterns. Kharevych, Springborn and Schröder]

Differential Geometry: Circle Patterns (Part 1) [Discrete Conformal Mappinngs via Circle Patterns. Kharevych, Springborn and Schröder] Differential Geometry: Circle Patterns (Part 1) [Discrete Conformal Mappinngs via Circle Patterns. Kharevych, Springborn and Schröder] Preliminaries Recall: Given a smooth function f:r R, the function

More information

CLASSIFICATION OF SURFACES

CLASSIFICATION OF SURFACES CLASSIFICATION OF SURFACES JUSTIN HUANG Abstract. We will classify compact, connected surfaces into three classes: the sphere, the connected sum of tori, and the connected sum of projective planes. Contents

More information

Topology of wireless networks

Topology of wireless networks Topology of wireless networks L. Decreusefond Institut Mines-Telecom Also starring (by chronological order of appearance) P. Martins, E. Ferraz, F. Yan, A. Vergne, I. Flint, N.K. Le Séminaire Brillouin

More information

Collars and Intestines: Practical Conforming Delaunay Refinement

Collars and Intestines: Practical Conforming Delaunay Refinement Collars and Intestines: Practical Conforming Delaunay Refinement Alexander Rand and Noel Walkington Carnegie Mellon University Summary. While several existing Delaunay refinement algorithms allow acute

More information

Discharging and reducible configurations

Discharging and reducible configurations Discharging and reducible configurations Zdeněk Dvořák March 24, 2018 Suppose we want to show that graphs from some hereditary class G are k- colorable. Clearly, we can restrict our attention to graphs

More information

Other Voronoi/Delaunay Structures

Other Voronoi/Delaunay Structures Other Voronoi/Delaunay Structures Overview Alpha hulls (a subset of Delaunay graph) Extension of Voronoi Diagrams Convex Hull What is it good for? The bounding region of a point set Not so good for describing

More information

Reversible Hyperbolic Triangulations

Reversible Hyperbolic Triangulations Reversible Hyperbolic Triangulations Circle Packing and Random Walk Tom Hutchcroft 1 Joint work with O. Angel 1, A. Nachmias 1 and G. Ray 2 1 University of British Columbia 2 University of Cambridge Probability

More information

Differential Geometry: Circle Packings. [A Circle Packing Algorithm, Collins and Stephenson] [CirclePack, Ken Stephenson]

Differential Geometry: Circle Packings. [A Circle Packing Algorithm, Collins and Stephenson] [CirclePack, Ken Stephenson] Differential Geometry: Circle Packings [A Circle Packing Algorithm, Collins and Stephenson] [CirclePack, Ken Stephenson] Conformal Maps Recall: Given a domain Ω R 2, the map F:Ω R 2 is conformal if it

More information

Constrained Delaunay Triangulations (CDT)

Constrained Delaunay Triangulations (CDT) Constrained Delaunay Triangulations (CDT) Recall: Definition 1 (Constrained triangulation). A triangulation with prespecified edges or breaklines between nodes. Motivation: Geological faults in oil recovery

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal

More information

Voronoi Diagrams in the Plane. Chapter 5 of O Rourke text Chapter 7 and 9 of course text

Voronoi Diagrams in the Plane. Chapter 5 of O Rourke text Chapter 7 and 9 of course text Voronoi Diagrams in the Plane Chapter 5 of O Rourke text Chapter 7 and 9 of course text Voronoi Diagrams As important as convex hulls Captures the neighborhood (proximity) information of geometric objects

More information

Connected Components of Underlying Graphs of Halving Lines

Connected Components of Underlying Graphs of Halving Lines arxiv:1304.5658v1 [math.co] 20 Apr 2013 Connected Components of Underlying Graphs of Halving Lines Tanya Khovanova MIT November 5, 2018 Abstract Dai Yang MIT In this paper we discuss the connected components

More information

arxiv: v1 [cs.cc] 30 Jun 2017

arxiv: v1 [cs.cc] 30 Jun 2017 Hamiltonicity is Hard in Thin or Polygonal Grid Graphs, but Easy in Thin Polygonal Grid Graphs Erik D. Demaine Mikhail Rudoy arxiv:1706.10046v1 [cs.cc] 30 Jun 2017 Abstract In 2007, Arkin et al. [3] initiated

More information

This blog addresses the question: how do we determine the intersection of two circles in the Cartesian plane?

This blog addresses the question: how do we determine the intersection of two circles in the Cartesian plane? Intersecting Circles This blog addresses the question: how do we determine the intersection of two circles in the Cartesian plane? This is a problem that a programmer might have to solve, for example,

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Technical Report UU-CS-2008-042 December 2008 Department of Information and Computing Sciences Utrecht

More information

The Structure of Bull-Free Perfect Graphs

The Structure of Bull-Free Perfect Graphs The Structure of Bull-Free Perfect Graphs Maria Chudnovsky and Irena Penev Columbia University, New York, NY 10027 USA May 18, 2012 Abstract The bull is a graph consisting of a triangle and two vertex-disjoint

More information

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality Planar Graphs In the first half of this book, we consider mostly planar graphs and their geometric representations, mostly in the plane. We start with a survey of basic results on planar graphs. This chapter

More information

Geometric structures on manifolds

Geometric structures on manifolds CHAPTER 3 Geometric structures on manifolds In this chapter, we give our first examples of hyperbolic manifolds, combining ideas from the previous two chapters. 3.1. Geometric structures 3.1.1. Introductory

More information

Topological estimation using witness complexes. Vin de Silva, Stanford University

Topological estimation using witness complexes. Vin de Silva, Stanford University Topological estimation using witness complexes, Acknowledgements Gunnar Carlsson (Mathematics, Stanford) principal collaborator Afra Zomorodian (CS/Robotics, Stanford) persistent homology software Josh

More information

MAT 3271: Selected Solutions to the Assignment 6

MAT 3271: Selected Solutions to the Assignment 6 Chapter 2: Major Exercises MAT 3271: Selected Solutions to the Assignment 6 1. Since a projective plan is a model of incidence geometry, Incidence Axioms 1-3 and Propositions 2.1-2.5 (which follow logically

More information

Algorithms for Grid Graphs in the MapReduce Model

Algorithms for Grid Graphs in the MapReduce Model University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Computer Science and Engineering: Theses, Dissertations, and Student Research Computer Science and Engineering, Department

More information

6.2 Classification of Closed Surfaces

6.2 Classification of Closed Surfaces Table 6.1: A polygon diagram 6.1.2 Second Proof: Compactifying Teichmuller Space 6.2 Classification of Closed Surfaces We saw that each surface has a triangulation. Compact surfaces have finite triangulations.

More information